Identifying UART and main() in an AVR firmware (ft. Zeta Two) part 1 - rhme2

Channel:
Subscribers:
921,000
Published on ● Video Link: https://www.youtube.com/watch?v=hyoPAOTrUMc



Duration: 15:07
21,395 views
435


Part 1 of reverse engineering another AVR firmware. Zeta Two shows us how to get started with reversing the code for the ATmega328P (AVR) chip. This was a challenge from the rhme2 competition. In this video we identify some I/O functions and the main() function.

rhme2: https://rhme.riscure.com/2/challenges
Zeta Two: https://twitter.com/zetatwo


-=[ 🔴 Stuff I use ]=-

→ Microphone:* https://geni.us/ntg3b
→ Graphics tablet:* https://geni.us/wacom-intuos
→ Camera#1 for streaming:* https://geni.us/sony-camera
→ Lens for streaming:* https://geni.us/sony-lense
→ Connect Camera#1 to PC:* https://geni.us/cam-link
→ Keyboard:* https://geni.us/mech-keyboard
→ Old Microphone:* https://geni.us/mic-at2020usb

US Store Front:* https://www.amazon.com/shop/liveoverflow

-=[ ❤️ Support ]=-

→ per Video: https://www.patreon.com/join/liveoverflow
→ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

-=[ 🐕 Social ]=-

→ Twitter: https://twitter.com/LiveOverflow/
→ Website: https://liveoverflow.com/
→ Subreddit: https://www.reddit.com/r/LiveOverflow/
→ Facebook: https://www.facebook.com/LiveOverflow/

-=[ 📄 P.S. ]=-

All links with "*" are affiliate links.
LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm.

#ReverseEngineering #CTF #EmbeddedHardware







Tags:
Live Overflow
liveoverflow
hacking tutorial
how to hack
exploit tutorial
AVR
reverse engineering
Zeta Two
rhme2
rhme3
riscure
Ida pro
atmega328p
atmega 328
reversing
reverseengineering
find main
indeintify uart
serial
assembler
embedded device
iot